mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-06 17:35:19 +00:00
Added missing tags and some minor improvements
This commit is contained in:
parent
ae1541242c
commit
99595a7f89
@ -4,6 +4,9 @@ references:
|
||||
- https://adsecurity.org/?p=2053
|
||||
- https://www.harmj0y.net/blog/activedirectory/roasting-as-reps/
|
||||
author: '@neu5ron'
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1089
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
|
@ -6,6 +6,9 @@ references:
|
||||
- https://technet.microsoft.com/en-us/library/cc726884(v=ws.10).aspx
|
||||
- https://msdn.microsoft.com/de-de/library/windows/desktop/aa363389(v=vs.85).aspx
|
||||
date: 2017/05/15
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1073
|
||||
author: Dimitrios Slamaris
|
||||
logsource:
|
||||
product: windows
|
||||
|
@ -7,6 +7,7 @@ author: Thomas Patzke
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.privilege_escalation
|
||||
- attack.t1098
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
|
@ -5,6 +5,9 @@ references:
|
||||
- https://www.techrepublic.com/article/how-to-track-down-usb-flash-drive-usage-in-windows-10s-event-viewer/
|
||||
status: experimental
|
||||
author: Florian Roth
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1200
|
||||
logsource:
|
||||
product: windows
|
||||
service: driver-framework
|
||||
|
@ -4,6 +4,7 @@ status: stable
|
||||
author: Florian Roth
|
||||
tags:
|
||||
- attack.privilege_escalation
|
||||
- attack.t1078
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
|
@ -2,6 +2,7 @@ title: Rare Scheduled Task Creations
|
||||
status: experimental
|
||||
description: This rule detects rare scheduled task creations. Typically software gets installed on multiple systems and not only on a few. The aggregation and count function selects tasks with rare names.
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.t1053
|
||||
- attack.s0111
|
||||
author: Florian Roth
|
||||
|
@ -4,7 +4,10 @@ description: Detects Base64 encoded Shellcode
|
||||
references:
|
||||
- https://twitter.com/cyb3rops/status/1063072865992523776
|
||||
tags:
|
||||
- attack.privilege_escalation
|
||||
- attack.execution
|
||||
- attack.t1055
|
||||
- attack.t1086
|
||||
author: David Ledbetter (shellcode), Florian Roth (rule)
|
||||
date: 2018/11/17
|
||||
logsource:
|
||||
|
@ -3,6 +3,9 @@ description: Detects suspicious powershell process which includes bxor command,
|
||||
status: experimental
|
||||
author: Sami Ruohonen
|
||||
date: 2018/09/05
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1086
|
||||
detection:
|
||||
selection:
|
||||
CommandLine:
|
||||
|
@ -6,6 +6,9 @@ references:
|
||||
- https://www.hybrid-analysis.com/sample/5567408950b744c4e846ba8ae726883cb15268a539f3bb21758a466e47021ae8?environmentId=100
|
||||
author: Florian Roth
|
||||
date: 2018/02/22
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.1036
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
|
@ -6,6 +6,9 @@ references:
|
||||
- https://www.google.com/url?hl=en&q=https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about&source=gmail&ust=1511481120837000&usg=AFQjCNGdL7gVwLXaNSl2Td8ylDYbSJFmPw
|
||||
author: Florian Roth
|
||||
date: 2017/11/23
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1211
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
|
@ -8,6 +8,9 @@ references:
|
||||
author: Florian Roth, Tom Ueltschi
|
||||
date: 2017/11/10
|
||||
modified: 2018/12/11
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1064
|
||||
detection:
|
||||
condition: selection
|
||||
level: high
|
||||
|
@ -2,6 +2,10 @@ title: WScript or CScript Dropper
|
||||
status: experimental
|
||||
description: Detects wscript/cscript executions of scripts located in user directories
|
||||
author: Margaritis Dimitrios (idea), Florian Roth (rule)
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.execution
|
||||
- attack.1064
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
|
@ -5,6 +5,8 @@ references:
|
||||
date: 2019/01/29
|
||||
tags:
|
||||
- attack.lateral_movement
|
||||
- attack.command_and_control
|
||||
- attack.t1090
|
||||
status: experimental
|
||||
author: Florian Roth
|
||||
logsource:
|
||||
|
@ -5,6 +5,7 @@ references:
|
||||
date: 2019/01/29
|
||||
tags:
|
||||
- attack.lateral_movement
|
||||
- attack.t1021
|
||||
status: experimental
|
||||
author: Florian Roth
|
||||
logsource:
|
||||
|
@ -6,6 +6,10 @@ references:
|
||||
- https://countuponsecurity.com/2017/06/07/threat-hunting-in-the-enterprise-with-appcompatprocessor/
|
||||
author: Florian Roth
|
||||
date: 2017/06/12
|
||||
tags:
|
||||
- attack.s0013
|
||||
- attack.defense_evasion
|
||||
- attack.t1073
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
|
@ -6,6 +6,10 @@ references:
|
||||
author: Florian Roth
|
||||
date: 2018/04/06
|
||||
modified: 2019/02/05
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.defense_evasion
|
||||
- attack.t1064
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
|
@ -5,6 +5,11 @@ references:
|
||||
- https://docs.microsoft.com/en-us/windows-hardware/drivers/devtest/bcdedit--set
|
||||
author: '@neu5ron'
|
||||
date: 2019/02/07
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1070
|
||||
- attack.persistence
|
||||
- attack.t1067
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
|
@ -5,15 +5,16 @@ references:
|
||||
- https://twitter.com/ItsReallyNick/status/1094080242686312448
|
||||
author: Florian Roth
|
||||
date: 2019/02/09
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1036
|
||||
logsource:
|
||||
product: windows
|
||||
category: process_creation
|
||||
service: sysmon
|
||||
detection:
|
||||
selection1:
|
||||
EventID: 1
|
||||
CommandLine: '*\calc.exe *'
|
||||
selection2:
|
||||
EventID: 1
|
||||
Image: '*\calc.exe'
|
||||
filter2:
|
||||
Image: '*\Windows\Sys*'
|
||||
|
@ -5,6 +5,10 @@ author: Florian Roth
|
||||
date: 2017/04/15
|
||||
references:
|
||||
- https://twitter.com/rikvduijn/status/853251879320662017
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1073
|
||||
- attack.t1085
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
|
@ -2,6 +2,9 @@ title: Execution in Webserver Root Folder
|
||||
status: experimental
|
||||
description: Detects a suspicious program execution in a web service root folder (filter out false positives)
|
||||
author: Florian Roth
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.1100
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
|
@ -4,6 +4,10 @@ status: experimental
|
||||
references:
|
||||
- https://twitter.com/subTee/status/891298217907830785
|
||||
author: juju4
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.execution
|
||||
- attack.t1064
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
|
@ -2,6 +2,9 @@ title: Suspicious Reconnaissance Activity
|
||||
status: experimental
|
||||
description: Detects suspicious command line activity on Windows systems
|
||||
author: Florian Roth
|
||||
tags:
|
||||
- attack.discovery
|
||||
- attack.t1087
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
|
@ -2,6 +2,9 @@ title: WSF/JSE/JS/VBA/VBE File Execution
|
||||
status: experimental
|
||||
description: Detects suspicious file execution by wscript and cscript
|
||||
author: Michael Haag
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1064
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
|
@ -6,6 +6,9 @@ references:
|
||||
- https://medium.com/@networksecurity/rdp-hijacking-how-to-hijack-rds-and-remoteapp-sessions-transparently-to-move-through-an-da2a1e73a5f6
|
||||
author: Florian Roth
|
||||
date: 2018/03/17
|
||||
tags:
|
||||
- attack.command_and_control
|
||||
- attack.t1219
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
|
@ -5,6 +5,9 @@ references:
|
||||
- https://twitter.com/GelosSnake/status/934900723426439170
|
||||
author: Florian Roth
|
||||
date: 2017/11/27
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1036
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
|
@ -1,6 +1,9 @@
|
||||
title: Java Running with Remote Debugging
|
||||
description: Detects a JAVA process running with remote debugging allowing more than just localhost to connect
|
||||
author: Florian Roth
|
||||
tags:
|
||||
- attack.discovery
|
||||
- attack.t1046
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
|
@ -4,6 +4,7 @@ description: Detects invocation of Microsoft Workflow Compiler, which may permit
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.execution
|
||||
- attack.t1127
|
||||
author: Nik Seetharaman
|
||||
references:
|
||||
- https://posts.specterops.io/arbitrary-unsigned-code-execution-vector-in-microsoft-workflow-compiler-exe-3d9294bc5efb
|
||||
|
@ -7,6 +7,10 @@ references:
|
||||
- https://msdn.microsoft.com/de-de/library/windows/desktop/aa363389(v=vs.85).aspx
|
||||
date: 2017/05/15
|
||||
author: Dimitrios Slamaris
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1073
|
||||
- attack.t1112
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
|
@ -5,6 +5,9 @@ references:
|
||||
- https://docs.google.com/spreadsheets/d/17pSTDNpa0sf6pHeRhusvWG6rThciE8CsXTSlDUAZDyo
|
||||
author: Florian Roth
|
||||
date: 2017/03/19
|
||||
tags:
|
||||
- attack.command_and_control
|
||||
- attack.t1043
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
@ -85,7 +88,7 @@ detection:
|
||||
- '172.29.*'
|
||||
- '172.30.*'
|
||||
- '172.31.*'
|
||||
- '127.0.0.1'
|
||||
- '127.*'
|
||||
DestinationIsIpv6: 'false'
|
||||
condition: selection and not ( filter1 or filter2 )
|
||||
falsepositives:
|
||||
|
@ -5,6 +5,9 @@ references:
|
||||
- https://jpcertcc.github.io/ToolAnalysisResultSheet/details/QuarksPWDump.htm
|
||||
author: Florian Roth
|
||||
date: 2018/02/10
|
||||
tags:
|
||||
- attack.credential_access
|
||||
- attack.t1003
|
||||
level: critical
|
||||
logsource:
|
||||
product: windows
|
||||
|
@ -36,7 +36,7 @@ detection:
|
||||
- '172.29.*'
|
||||
- '172.30.*'
|
||||
- '172.31.*'
|
||||
- '127.0.0.1'
|
||||
- '127.*'
|
||||
condition: selection and not filter
|
||||
falsepositives:
|
||||
- Communication to other corporate systems that use IP addresses from public address spaces
|
||||
|
@ -5,6 +5,9 @@ references:
|
||||
- https://cyberwardog.blogspot.com/2017/03/chronicles-of-threat-hunter-hunting-for.html
|
||||
author: Markus Neis
|
||||
date: 2018/01/07
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1073
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
|
@ -5,6 +5,9 @@ references:
|
||||
- https://twitter.com/M_haggis/status/900741347035889665
|
||||
- https://twitter.com/M_haggis/status/1032799638213066752
|
||||
author: Michael Haag (idea), Florian Roth (rule)
|
||||
tags:
|
||||
- attack.lateral_movement
|
||||
- attack.t1105
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
|
@ -6,6 +6,9 @@ references:
|
||||
- https://twitter.com/M_haggis/status/1032799638213066752
|
||||
author: Florian Roth
|
||||
date: 2018/08/30
|
||||
tags:
|
||||
- attack.lateral_movement
|
||||
- attack.t1105
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
|
Loading…
Reference in New Issue
Block a user